·
Cybersecurity glossary
Explore by category
Discover topics that matter to you.
Security concepts and tools
Core cybersecurity technologies and principles
Encryption and cryptographyAuthentication and access control
Security concepts
Firewall terms
Network and communication security
Main tools for secure network communication
Networking FundamentalsVPN terms
DNS terms
Protocols and standards
Threats and cyberattacks
Cybersecurity threats and attack methods explained
Malware and exploitsPhishing and social engineering
Network and application attacks
Data breaches and identity theft
Cybercrime and cyber extortion
Governance, risk and compliance (GRC)
Organizational cybersecurity and compliance
Cybersecurity governancePrivacy and compliance
Fraud, espionage, and hacktivism
Risk management and monitoring
Incident response and recovery
Web and connectivity
Secure online and wireless communications
Website securityEmail security
Wireless security
Router security
Systems and devices
Security for devices, operating systems, and infrastructure
Operating systems and platformsMobile and IoT security
Hardware and device security
Server and infrastructure
Data management and storage
Protection of stored data and backup systems
Database securityStorage
Backup
Technologies and trends
Cloud, AI, and blockchain technologies explained
Cloud and virtualizationAI and machine learning
Blockchain
The importance of cybersecurity terminology
Getting familiar with cybersecurity terms helps you spot, handle, and stop online threats before they become serious problems. Familiarize yourself with cybersecurity terminology to:
Recognize threats
When you know what phishing or ransomware looks like, you can stop the attack before it causes damage.
Make informed decisions
Understanding cybersecurity may help you choose the right tools and practices to protect your online activity.
Stay ahead of scammers
Cybercriminals feed on your confusion — knowing their tactics may help you see through their tricks.
Key cybersecurity terms you should know
Learn some basic terms to help you grasp the nuances of online security.
DNS
DNS translates website names (like google.com) into IP addresses (like 142.250.80.46) so your device knows where to find websites.
Firewall
A firewall filters network traffic by blocking potentially harmful connections while allowing legitimate data to pass through your device.
Artificial intelligence
Artificial intelligence is technology that enables computers to mimic aspects of human intelligence like learning, thinking, and making decisions.
Scam
Scams are deceptive schemes where criminals manipulate the victim to steal money or personal information.
Fraud
Fraud is when someone uses deception or false information to gain money, property, or services that don't belong to them.
Exploit
An exploit is when a criminal takes advantage of someone’s weakness or vulnerability to gain unauthorized access or financial benefit.
Cloud computing
Cloud computing is technology that lets you store files and run programs online instead of on your computer.
GDPR
The GDPR is a European law that gives people control over how companies collect, use, and protect their personal data.
Encryption
Encryption is technology that scrambles information into gibberish to keep it safe from unauthorized access.
WAN
A WAN is a network that connects computers and devices across large distances, like between cities or countries.
Web server
A web server is software and hardware that receives HTTP and HTTPS requests from browsers and responds with web content.
Recent cybersecurity terms and definitions
Stay up to date with the latest security terminology.
Turn your knowledge into protection
Take care of your online presence with NordVPN
Why NordVPN cares about covering cybersecurity terminology
At NordVPN, we believe that cybersecurity should be accessible and easily understandable. We cover these terms because informed users make smarter decisions — if you're aware of what phishing or malware can look like, you can better protect your online presence. Plus, an equipped user contributes to a more trustworthy internet for everyone, turning the tables for cybercriminals.
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.